Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000003156803 | TK5105.875.I57 H27 1995 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
This text shows how security is implemented in the computer world, and the ways in which those checkpoints can be side-stepped by trespassers intent on doing harm. It also shows ways of cutting your losses, catching hackers and limiting their access.
Reviews 1
Library Journal Review
To some, a firewall is the alpha and omega of computing security. Running a computer to filter and protect your network will guard you from many dangers, they claim. To others, a firewall is just one more challenge to overcome in finding electronic jewels on servers and other machines in an organization. In two parts and several appendixes, Siyan and Hare examine the basic problems in networking and the specific means to filter traffic and deter security troubles. First, they discuss TCP/IP, networking, and network policy. Second, they examine screening routers and packet filters with plenty of helpful illustrations. While they do not offer detailed coverage of the broad range of topics found in Network Security because they tackle just one subset of the security spectrum, Siyan and Hare have done an admirable job in making that complicated topic understandable. (c) Copyright 2010. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.